Description
Multiple cross-site scripting (XSS) vulnerabilities in TorrentTrader Classic 1.09 allow remote authenticated users to inject arbitrary web script or HTML via (1) the Title field to requests.php, related to viewrequests.php; and (2) the Torrent Name field to torrents-upload.php, related to the logging of torrent uploads; and allow remote attackers to inject arbitrary web script or HTML via (3) the ttversion parameter to themes/default/footer.php, the (4) SITENAME and (5) CURUSER[username] parameters to themes/default/header.php, (6) the todayactive parameter to visitorstoday.php, (7) the activepeople parameter to visitorsnow.php, (8) the faq_categ[999][title] parameter to faq.php, and (9) the keepget parameter to torrents-details.php.
Exploits (1)
References (7)
Core 7
Core References
Exploit x_refsource_misc
http://www.waraxe.us/advisory-74.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/51145
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/35456
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35369
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8958
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/504294/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/51144
Scores
EPSS
0.0088
EPSS Percentile
75.5%
Details
CWE
CWE-79
Status
published
Products (1)
torrenttrader/torrenttrader_classic
1.09
Published
Jun 22, 2009
Tracked Since
Feb 18, 2026